Firewall

Select Firewall IDS Configuration to configure the IDS Configuration as explained below.

Web UI

IDS Configuration

Enable IDS

Select Enable to activate the IDS.

 

 

Flood Attack

Select Enable to activate all types of flood attacks available on this router

 

i.e. SYN flood attack, ICMP flood attack, ICMP Echo storm attack. In

 

these attacks, packets are flooded continuously on the target machine.

 

 

Ping of Death

Select Enable to activate a form of DoS (denial of service) attack. This

 

attack consists of flood of large-sized ping requests designed to disrupt

 

the normal activity of a system.

 

 

Boink Attack

Select Enable to activate the Boink attack. It involves the perpetrator

 

sending corrupt UDP packets to host.

 

 

Smurf Attack

Select Enable to activate Smurf attack. This is named after its exploit

 

program and is the most recent network intrusions against hosts.

 

 

TCP SYN Attack

Select Enable to activate TCP attacks like SYN/ACK attack, FIN attack

 

and RESET attack. These attacks exploit the three-way TCP handshaking.

 

 

Port scan Attack

Select Enable to activate the port scan attacks like Netbus scan, Back

 

orifice scan, Echo chargen scan, UDP echo scan, Chargen scan, IMAP

 

scan. All ports are scanned under this attack.

 

 

Land Attack

Select Enable to activate the Land attack. In this attack the perpetrator

 

sends spoofed packet(s) with the SYN flag set to the victim's machine on

 

any open port that is listening. If the packet contains the same source and

 

destination IP address as the host, the victim's machine could hang or

 

reboot.

 

 

Winnuke Attack

Select Enable to activate Denial of service attack. This attack sends OOB

 

data to an established connection on port 139 (NetBIOS), to any windows

 

user using 95/NT/3.x.

 

 

XMAS-Tree Attack

Select Enable to activate the XMAS Tree attack. This attack uses the DoS

 

technique that sets all TCP header flags to ‘ON’ in an attempt to gain

 

information regarding a network.

 

 

Ascend kill Attack

Select Enable to activate the Ascend Kill attack. This attack makes the

 

remote Ascend router reboot by sending it a UDP packet containing

 

special data on port 9(discard).

 

 

After entering all the information press the Apply button. The attacks are logged on the Intrusion Log. The IP address of the attacker is blacklisted to prevent any further attacks.

Note: To ensure the highest level of security in a

network, it is recommended to

￿ enable detection of all the attacks supported by the router.

 

Dlink DRO-210i User Guide

47

Page 47
Image 47
D-Link DRO-210i manual IDS Configuration

DRO-210i specifications

The D-Link DRO-210i is an innovative smart security camera designed to bring peace of mind to homeowners and businesses alike. With its sleek design and advanced features, the DRO-210i stands out as a reliable surveillance solution that caters to a range of security needs.

One of the main features of the DRO-210i is its high-definition video streaming capability. With a resolution of up to 1080p, users can enjoy crisp and clear video footage, ensuring that every detail is captured. This camera is equipped with a wide-angle lens, offering a 130-degree field of view, which allows for comprehensive monitoring of large areas, making it ideal for both indoor and outdoor use.

The DRO-210i utilizes advanced infrared night vision technology, enabling it to capture clear images even in complete darkness. This feature ensures that security is maintained 24/7, offering peace of mind regardless of lighting conditions. The camera automatically switches to night mode when it detects low light, ensuring continuous monitoring without manual intervention.

Another standout characteristic of the DRO-210i is its motion detection capabilities. The camera features customizable motion zones and alerts, allowing users to define specific areas for monitoring. When motion is detected, the camera can send real-time alerts to the user's smartphone or email, ensuring prompt responses to any potential security threats.

The integration of two-way audio allows for real-time communication through the camera. Users can listen and speak through the camera's built-in speaker and microphone, providing an added layer of security. This feature is particularly useful for engaging with visitors or deterring potential intruders.

For convenient storage options, the DRO-210i supports both local and cloud storage. Users can insert a microSD card for local recording or opt for D-Link’s cloud storage service for easy and secure access to footage from anywhere in the world. This flexibility ensures that important recordings are safely stored and easily retrievable.

The camera's compatibility with smart home systems is an essential aspect of its design. The DRO-210i works seamlessly with various smart home ecosystems, allowing users to integrate it into their existing setups, enhancing their overall smart home experience.

In summary, the D-Link DRO-210i is a feature-rich, user-friendly security camera equipped with high-definition video, night vision, motion detection, two-way audio, and flexible storage options. Its compatibility with smart home technologies makes it an ideal choice for those seeking a comprehensive surveillance solution that not only enhances security but also integrates with their lifestyle.